Tapestry

The Tapestry App

For all apple mac based products such as an iphone/ipad/ipad mini etc you can visit the app store on the itunes website. To download the free app click here

We're very pleased to let you know that the Android App for Tapestry is now out of beta and available on the Google Play store for you to download. Please be aware that the app is only useful for Tapestry subscribers, so it is not useable as a standalone application.To download, just open your android device and go to the play store, click here

Parent Tutorials

Tapestry Security

This is an overview from the makers of Tapestry regarding its online security

Physical security

Hosted on dedicated servers in a high security data centre in the UK (just north of London). Knowing that the data (and backups) are not stored in other jurisdictions means that we can be confident that all data is governed by UK law.

These servers are backed up four times daily, to an off-site datacentre 20 miles from our main datacentre, so that in the event of a major disaster, recovery of entire servers is still possible within a couple of hours.

The servers are proactively managed 24 hours a day, including regular updates and patches for security vulnerabilities.

Additionally our servers conform to very high environmental standards, being audited and certified to ISO 14001 (Environment Management) standards.

Application Security

The Tapestry accounts and code are held on a secure server (https and the padlock on the address bar) as is usual for sites requiring extra security.

Each Tapestry account has its own database - a setting's information is not held in a larger database with other accounts.

The code itself is developed using hack resistant techniques such as CSRF (Cross Site Request Forgery) protection via form keys, and input fields checked and stripped for XSS (Cross Site Scripting) data and characters

Filenames are encoded for uploaded photos, video and images. Log in passwords are never stored but are instead salted and then hashed

The framework is well tested and developed by a programmer experienced in the field of web applications subject to hacking attempts